subject

Application logs are useful in analyzing interaction with an application and may also be used to detect suspicious activities. A log file is provided as a string array where each entry represents a money transfer in the form "sender_user_id recipient_user_id amount". Each of the values is separated by a space. • sender_user_id and recipient_user_id both consist only of digits, are at most 9 digits long and start with non-zero digit amount consists only of digits, is at most 9 digits long and starts with non-zero digit • Logs are given in no particular order. Write a function that returns an array of strings denoting user_id's of suspicious users who were involved in at least threshold number of log entries. The id's should be ordered ascending by numeric value. Example logs = ["88 99 200", "88 99 300", "99 32 100","12 12 15") threshold 2 The transactions count for each user, regardless of role are: ID Transactions 99 32 There are two users with at least threshold - 2 transactions: 99 and 88. In ascending order, the return array is ('88', '99'). Note: In the last log entry, user 12 was on both sides of the transaction. This counts as only 1 transaction for user 12. Function Description Function Description Complete the function processLogs in the editor below. The function has the following parameter(s): string logs/n): each logsli) denotes the ith entry in the logs int threshold: the minimum number of transactions that a user must have to be included in the result Returns: stringl): an array of user id's as strings, sorted ascending by numeric value Constraints • 1sns 105 • 1 sthreshold sn • The sender_user_id, recipient_user_id and amount contain only characters in the range asci['O'-'9'). • The sender_user_id, recipient_user_id and amount start with a non-zero digit. • 0 < length of sender_user_id, recipient_user_id, amounts 9. • The result will contain at least one element

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 11:00
What are two of the most common reasons that peolpe who need mental health care do not access it?
Answers: 1
question
Computers and Technology, 22.06.2019 20:00
What statement best describes operating systems? it’s possible for modern computers to function without operating systems. most operating systems are free or very inexpensive. operating systems are managed by the computer’s microprocessor (cpu). operating systems manage the computer’s random access memory (ram).
Answers: 1
question
Computers and Technology, 23.06.2019 01:00
Write the command that can be used to answer the following questions. (hint: try each out on the system to check your results.) a. find all files on the system that have the word test" as part of their filename. b. search the path variable for the pathname to the awk command. c. find all files in the /usr directory and subdirectories that are larger than 50 kilobytes in size. d. find all files in the /usr directory and subdirectories that are less than 70 kilobytes in size. e. find all files in the / directory and subdirectories that are symbolic links. f. find all files in the /var directory and subdirectories that were accessed less than 60 minutes ago. g. find all files in the /var directory and subdirectories that were accessed less than six days ago. h. find all files in the /home directory and subdirectories that are empty. i. find all files in the /etc directory and subdirectories that are owned by the group bin."
Answers: 1
question
Computers and Technology, 23.06.2019 11:30
The most accurate readings that you can take on an analog vom are when the meter's pointer is at the a. center scale. b. extreme right. c. near right. d. extreme left.
Answers: 1
You know the right answer?
Application logs are useful in analyzing interaction with an application and may also be used to det...
Questions
question
Mathematics, 10.11.2020 01:00
question
Mathematics, 10.11.2020 01:00
question
Mathematics, 10.11.2020 01:00
question
Chemistry, 10.11.2020 01:00
question
Physics, 10.11.2020 01:00